First published: Wed Mar 14 2018(Updated: )
Microsoft Exchange Outlook Web Access (OWA) in Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allows an elevation of privilege vulnerability due to how links in the body of an email message are rewritten, aka "Microsoft Exchange Elevation of Privilege Vulnerability".
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Exchange Server | =2010-sp3_rollup20 | |
Microsoft Exchange Server | =2013-cumulative_update_18 | |
Microsoft Exchange Server | =2013-cumulative_update_19 | |
Microsoft Exchange Server | =2013-sp1 | |
Microsoft Exchange Server | =2016-cumulative_update_7 | |
Microsoft Exchange Server | =2016-cumulative_update_8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0940 has a CVSS score indicating a critical severity level, which suggests it poses a significant security risk.
To fix CVE-2018-0940, you should apply the latest security updates from Microsoft for the affected versions of Exchange Server.
CVE-2018-0940 affects Microsoft Exchange Server 2010 SP3 Rollup 20, Exchange Server 2013 CU18 and CU19, Exchange Server 2013 SP1, and Exchange Server 2016 CU7 and CU8.
Yes, CVE-2018-0940 could potentially allow attackers to gain unauthorized access to sensitive data.
While the best mitigation for CVE-2018-0940 is updating to the latest version, temporarily disabling certain features may reduce risk until a patch is applied.